Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Promotional and commercial content distribution based on a legal and trusted P2P framework

: Schmucker, M.; Ebinger, P.


Müller, G. ; IEEE Computer Society, Technical Committee on Electronic Commerce:
Seventh IEEE International Conference on E-Commerce Technology, CEC 2005 : 19 - 22 July 2005, Munich, Germany
Los Alamitos, Calif.: IEEE Computer Society, 2005
ISBN: 0-7695-2277-7
International Conference on E-Commerce Technology (CEC) <7, 2005, München>
Conference Paper
Fraunhofer IGD ()
content filtering; digital rights management; DRM; fingerprinting; peer-to-peer; perceptual hashing; security

Peer-to-Peer (P2P) file sharing systems have reached high popularity among computer users. They neither have a single point of failure nor a central bottleneck. Other benefits include scalability, load balancing, and fault tolerance. The distributed nature of P2P file sharing systems transfers the direct costs of storage and networking from the provider to the user. Unfortunately P2P Networks are also often used for content distribution that violates Intellectual Property Rights (IPR).
In this article we show how a P2P file sharing system which adheres to IPR laws can be built. In contrast to existing Digital Rights Management (DRM) Systems which strongly interfere with accustomed content usage, our suggested solution does not impede familiar usage patterns and new content can be provided easily. The primary aim for the development of this architecture is to support new and niche artists by enabling the distribution of free and promotional content, however the system can also be extended for the commercial distribution of content.
Fingerprinting and cryptographic hash technologies are utilized to ensure legal and secure content distribution. Our proposed content distribution system is based on a self policing method whereby each user's content and activities are scrutinized by the peers they are exchanging content with. This allows the mutual monitoring of content between the communicating peers on the network and therefore only authorized files can be exchanged. Finally this model ensures that a user is liable for the distribution of non-authorized files.